Memoization Attacks and Copy Protection in Partitioned Applications
Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, these capabilities incur a sizeable performance overhead. Partitioning an...
Main Authors: | O'Donnell, Charles W., Suh,, G. Edward, Dijk, Marten vn, Devadas, Srinivas |
---|---|
Other Authors: | Srini Devadas |
Language: | en_US |
Published: |
2006
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/34954 |
Similar Items
-
Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
by: Sarmenta, Luis F. G., et al.
Published: (2006) -
Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them
by: Kealan Mannix, et al.
Published: (2022-08-01) -
EffTEE: Efficient Image Classification and Object Detection on Mobile Devices Using Trusted Execution Environments
by: Bin Hu, et al.
Published: (2025-01-01) -
FairCs—Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment
by: Yihuai Liang, et al.
Published: (2020-06-01) -
Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs
by: Jan Pennekamp, et al.
Published: (2024-01-01)